The rise of Free and Open Source Software has led to more secure and heavily scrutinized cryptographic solutions.
However, below the surface of open source operating systems, strictly closed source firmware along with device driver blobs and closed system architecture prevent users from examining, understanding, and trusting the systems where they run their private computations.
Embedded technologies like Intel Management Engine pose significant threats when, not if, they get exploited.
Advanced attackers in possession of firmware signing keys, and even potential access to chip fabrication, could wreak untold havoc on cryptographic devices we rely on.
0ctane 0ctane is a longtime hobbyist hacker, with experience primarily in UNIX systems and hardware.
This concept isn't "unhacakable", rather we believe it to be the most fixable; this is what users and hackers should ultimately be fighting for.
Other interests include SDR and RF exploration, networking, cryptography, computer history, distributed computing...really anything that sounds cool that I happen to stumble on at 3am.
Saturday at in Track 4 20 minutes | Demo Much of next-gen AV relies on machine learning to generalize to never-before-seen malware.
Prior to joining Endgame he conducted information security and situational awareness research as a researcher at Fire Eye, Mandiant, Sandia National Laboratories and MIT Lincoln Laboratory.
He received his Ph D in Electrical Engineering (signal and image processing machine learning) from the University of Washington and BS/MS degrees from Brigham Young University.